Cybercrime Forensics Questions and
Answers Rated A+
All hidden evidence is trace evidence. - Answers-TRUE
b/c it is tedious and time consuming
Analyzing the Evidence - Answers-take copy and analyze the copy not the original
Computer Assisted Crimes - Answers-using the computer to gain information, phishing,
computer as a tool
Uses computer to get information about someone
Stealing Via Computer
Computer Content Crimes - Answers-sexting, pornography, using the computer for
content crimes, hate speech
Computer Forensics - Answers-the specialized practice of identifying, preserving,
extracting, documenting and interpreting electronic data that can be used as evidence
Focuses on electronic info that can be used as evidence
Computer Integrity Crimes - Answers-computer's integrity/honesty is compromised,
what a hacker does, illegally accessing data is compromised, think you are safe but are
not
Making computer less trustworthy
Content Spyware - Answers-software that is used to allow a hacker to access all the
activity on an individual's personal or business computer
Software that allows the hacker to access (ex: computer)
Cyber-terrorism - Answers-hacking into a company's internal networking system for the
purpose of demonstrating or protesting a political agenda
Entering the crime scene - Answers-Collect as much as possible (digital or physical)
Establish a chain of custody for each piece of evidence
Hacking - Answers-Intentionally entering an unauthorized network system
How do we investigate to prosecute these crimes? - Answers-Enter crime scene,
preserve evidence, analyzing evidence, present to jury
How people snoop? - Answers-Dumpster Diving: dive in dumpster to get mail, address,
etc.
Phising: getting information from the person themselves, emails
Spyware: Cookies, attach to computer (facebook)
Answers Rated A+
All hidden evidence is trace evidence. - Answers-TRUE
b/c it is tedious and time consuming
Analyzing the Evidence - Answers-take copy and analyze the copy not the original
Computer Assisted Crimes - Answers-using the computer to gain information, phishing,
computer as a tool
Uses computer to get information about someone
Stealing Via Computer
Computer Content Crimes - Answers-sexting, pornography, using the computer for
content crimes, hate speech
Computer Forensics - Answers-the specialized practice of identifying, preserving,
extracting, documenting and interpreting electronic data that can be used as evidence
Focuses on electronic info that can be used as evidence
Computer Integrity Crimes - Answers-computer's integrity/honesty is compromised,
what a hacker does, illegally accessing data is compromised, think you are safe but are
not
Making computer less trustworthy
Content Spyware - Answers-software that is used to allow a hacker to access all the
activity on an individual's personal or business computer
Software that allows the hacker to access (ex: computer)
Cyber-terrorism - Answers-hacking into a company's internal networking system for the
purpose of demonstrating or protesting a political agenda
Entering the crime scene - Answers-Collect as much as possible (digital or physical)
Establish a chain of custody for each piece of evidence
Hacking - Answers-Intentionally entering an unauthorized network system
How do we investigate to prosecute these crimes? - Answers-Enter crime scene,
preserve evidence, analyzing evidence, present to jury
How people snoop? - Answers-Dumpster Diving: dive in dumpster to get mail, address,
etc.
Phising: getting information from the person themselves, emails
Spyware: Cookies, attach to computer (facebook)